Leading into creation of a Red Team-a function that is not separate but integrated into your cybersecurity organization and process-can lead to successful, focused testing on areas of your business applications and enterprise. Come share ideas about how red teams are being used and best practices for feeding those results cyclically into your mitigations mechanisms. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
DevSecOps & Application Security Hackers & Threats
controls cyber warfare & cyber weapons hackers & threats penetration testing security operations
Share With Your Community